Sharon Goldberg: Attacking the Network Time Protocol: https://eprint.iacr.org/2015/1020
Miro Haller: MEGA: Malleable Encryption Goes Awry: https://mega-awry.io/
Nadia Heninger: Mining your Ps and Qs: https://factorable.net/
Dan Shumow: On the Possibility of a Back Door in the NIST SP800-90 Dual EC PRNG: https://rump2007.cr.yp.to/15-shumow.pdf
Marc Stevens: MD5 considered harmful today: https://www.win.tue.nl/hashclash/rogue-ca/
Adam Suhl: On the Possibility of a Backdoor in the Micali-Schnorr Generator: https://eprint.iacr.org/2023/440
Sharon Goldberg: Attacking the Network Time Protocol: https://eprint.iacr.org/2015/1020
Miro Haller: MEGA: Malleable Encryption Goes Awry: https://mega-awry.io/
Nadia Heninger: Mining your Ps and Qs: https://factorable.net/
Dan Shumow: On the Possibility of a Back Door in the NIST SP800-90 Dual EC PRNG: https://rump2007.cr.yp.to/15-shumow.pdf
Marc Stevens: MD5 considered harmful today: https://www.win.tue.nl/hashclash/rogue-ca/
Adam Suhl: On the Possibility of a Backdoor in the Micali-Schnorr Generator: https://eprint.iacr.org/2023/440